You are here
Home > News > Technology

Goodbye Passwords: Hello Identity Management

The death of passwords has been announced many times. When my mum stops using them, I'll be convinced that we've finally moved on to something better...: Keeping track of user names and passwords sounds easy, but it is not. In a world where protected network resources are accessed by employees on mobile devices, outside contractors, web applications and internet of things (IoT) devices – passwords just don’t cut it anymore. The stakes are high: Eighty-one percent of confi

VMware talks up multi-cloud era, need to transform security

All together now (in best Scotty accent) "You cannae change the laws of physics". The secondary point about rising complexity of security 'solutions' is well made. I suggest you send the next 'magic bullet' vendor away with a flea in their ear (unless it's my company)...: Driven by the laws of physics, economics, and land, the future of enterprise computing will head towards a multi-cloud era and technology vendors will have to step up to help businesses manage these environ

US to endorse new OECD principles on artificial intelligence

Let's see if they stick to the agreement...: PARIS — Donald Trump’s administration has finally found an international agreement it can support. At an annual meeting on Wednesday, the 36 countries in the Organization for Economic Cooperation and Development (OECD) plus a handful of other nations are set to adopt a list of guidelines for the development and use of artificial intelligence. The agreement, seen by POLITICO, marks the first time that the United States — home

Google’s Web Packaging standard arises as a new tool for privacy enthusiasts

Interested to see who uses this more, bad actors or those with politically sensitive content...: [...] "This can enable privacy safe pre-loading models because the data to fetch the package doesn't go back to the origin server," said Ben Galbraith, Senior Director at Google, while speaking on stage at the Google I/O 2019 developer conference yesterday. Web Packaging looks like an ideal solution in cases where nation-states or internet service providers might block access

Privacy & Regulatory Considerations in Enterprise Blockchain

I've been an advisor for a few blockchain-based startups. My first question is usually "Does it really need to be on a blockchain?" followed by "What information will be on the chain vs. what do you hold off-chain?". This article details why you need to think about privacy and regulatory risk alongside cyber risk when developing your blockchain apps...: People who understand information governance, privacy, and security should be active participants on the distributed ledger

Can Internet-of-Body Thwart Cyber Attacks on Implanted Medical Devices?

An alternative approach for communicating with medical devices?...: [...] No known attack on a life-supporting medical device has actually occurred, makers of such machines often point out. And encrypting the signals on these devices should provide reasonable protection. But Sen, at Purdue, says encryption isn’t enough. “The physical signals are available, and we are not good with using passwords,” he says. To thwart would-be attackers, Sen and his colleagues have designe

AI will take over your job — maybe

AI in an advisory capacity, I'm fine with that. But when AI becomes the primary decision maker, who carries the can when things go wrong (and they will)...: We know artificial intelligence technology will change the future of jobs and the labor market. What we don’t know yet is how. In less than a decade, machines could take over 52 percent of the current workload, compared to 29 percent today, according to a report from the World Economic Forum. It’s not all bad news,

This story was not written by a robot

Could you ever trust software to be impartial?...: BERLIN — Robot reporters have arrived in the newsroom. Algorithms are writing up company earnings, covering sports championships and dabbling in crime and politics. One day, if the techno-optimists are to be believed, they will be doing much of the work journalists do today. For now, your loyal correspondent’s job seems to be safe. Despite the galloping pace of technological progress, computers are still far from being ab

Startup Armor Scientific Launches Multifactor Identity System

It's a good idea, removing the need for multiple steps to get authenticated, but it sounds fiendishly complicated to achieve...: [...] Increasingly, companies are moving to two-factor (2FA) authentication or MFA to allow authorized users and workers access to their systems and services. However, nearly two-thirds of companies have reported facing stiff resistance from workers to adopt two-factor authentication, according to an August 2018 study. 2FA can be slow, so many s

Why An Expanded Password System Is Vital For Cyber Security

This article about the evolution of identity management was written by a Japanese author so apologies for the 'interesting' English but he makes some very good points. For example, even the most sophisticated and tamper-proof biometrics can be rendered insecure by the provision of a fall-back authentication like a PIN (we've probably all encountered this on a mobile device). Worth a read...: [...] You might assume that biometrics deployed with a password/PIN in ‘multi-layer’